SE539602C2 - Generating a symmetric encryption key - Google Patents

Generating a symmetric encryption key Download PDF

Info

Publication number
SE539602C2
SE539602C2 SE1451210A SE1451210A SE539602C2 SE 539602 C2 SE539602 C2 SE 539602C2 SE 1451210 A SE1451210 A SE 1451210A SE 1451210 A SE1451210 A SE 1451210A SE 539602 C2 SE539602 C2 SE 539602C2
Authority
SE
Sweden
Prior art keywords
terminal
key data
key
ckd
processing file
Prior art date
Application number
SE1451210A
Other languages
English (en)
Swedish (sv)
Other versions
SE1451210A1 (en
Inventor
Revell Elise
Original Assignee
Kelisec Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kelisec Ab filed Critical Kelisec Ab
Priority to SE1451210A priority Critical patent/SE539602C2/en
Priority to US15/516,939 priority patent/US10348498B2/en
Priority to PCT/SE2015/051066 priority patent/WO2016056987A1/fr
Priority to EP15849717.2A priority patent/EP3205048B1/fr
Priority to TW104133308A priority patent/TW201626752A/zh
Publication of SE1451210A1 publication Critical patent/SE1451210A1/en
Publication of SE539602C2 publication Critical patent/SE539602C2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
SE1451210A 2014-10-09 2014-10-09 Generating a symmetric encryption key SE539602C2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
SE1451210A SE539602C2 (en) 2014-10-09 2014-10-09 Generating a symmetric encryption key
US15/516,939 US10348498B2 (en) 2014-10-09 2015-10-08 Generating a symmetric encryption key
PCT/SE2015/051066 WO2016056987A1 (fr) 2014-10-09 2015-10-08 Génération d'une clé de cryptage symétrique
EP15849717.2A EP3205048B1 (fr) 2014-10-09 2015-10-08 Génération d'une clé de cryptage symétrique
TW104133308A TW201626752A (zh) 2014-10-09 2015-10-08 產生對稱加密密鑰

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SE1451210A SE539602C2 (en) 2014-10-09 2014-10-09 Generating a symmetric encryption key

Publications (2)

Publication Number Publication Date
SE1451210A1 SE1451210A1 (en) 2016-04-10
SE539602C2 true SE539602C2 (en) 2017-10-17

Family

ID=55653453

Family Applications (1)

Application Number Title Priority Date Filing Date
SE1451210A SE539602C2 (en) 2014-10-09 2014-10-09 Generating a symmetric encryption key

Country Status (5)

Country Link
US (1) US10348498B2 (fr)
EP (1) EP3205048B1 (fr)
SE (1) SE539602C2 (fr)
TW (1) TW201626752A (fr)
WO (1) WO2016056987A1 (fr)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE538279C2 (sv) 2014-09-23 2016-04-19 Kelisec Ab Förfarande och system för att fastställa förekomst av
SE542460C2 (en) 2014-10-09 2020-05-12 Kelisec Ab Improved security through authenticaton tokens
SE540133C2 (en) 2014-10-09 2018-04-10 Kelisec Ab Improved system for establishing a secure communication channel
SE539271C2 (en) 2014-10-09 2017-06-07 Kelisec Ab Mutual authentication
SE538304C2 (sv) 2014-10-09 2016-05-03 Kelisec Ab Improved installation of a terminal in a secure system
US11153077B2 (en) * 2018-12-14 2021-10-19 Westinghouse Air Brake Technologies Corporation Secure vehicle to vehicle communication
WO2020072474A1 (fr) 2018-10-02 2020-04-09 Capital One Services, Llc Systèmes et procédés d'authentification cryptographique des cartes sans contact
CA3115084A1 (fr) 2018-10-02 2020-04-09 Capital One Services, Llc Systemes et procedes d'authentification cryptographique de cartes sans contact
US11356425B2 (en) * 2018-11-30 2022-06-07 Paccar Inc Techniques for improving security of encrypted vehicle software updates
GB201912132D0 (en) * 2019-08-23 2019-10-09 Angoka Ltd Symmetric key generation, authentication and communication betwenn a plurality of entities in a network
IL294643A (en) * 2020-01-10 2022-09-01 Zeu Tech Inc A method for symmetric asynchronous generative encryption
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
CN115580440A (zh) * 2022-09-19 2023-01-06 中国银联股份有限公司 一种数据共享系统、方法、装置、设备及介质

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4578531A (en) 1982-06-09 1986-03-25 At&T Bell Laboratories Encryption system key distribution method and apparatus
US7298851B1 (en) 1992-12-09 2007-11-20 Discovery Communications, Inc. Electronic book security and copyright protection system
US20020159598A1 (en) 1997-10-31 2002-10-31 Keygen Corporation System and method of dynamic key generation for digital communications
US7079653B2 (en) 1998-02-13 2006-07-18 Tecsec, Inc. Cryptographic key split binding process and apparatus
AU7182701A (en) 2000-07-06 2002-01-21 David Paul Felsher Information record infrastructure, system and method
US7043633B1 (en) 2000-08-28 2006-05-09 Verizon Corporation Services Group Inc. Method and apparatus for providing adaptive self-synchronized dynamic address translation
IL144369A (en) 2001-07-17 2009-06-15 Eli Yanovsky Secure communication system and method using shared random source for key changing
US20030145203A1 (en) 2002-01-30 2003-07-31 Yves Audebert System and method for performing mutual authentications between security tokens
US7350079B2 (en) 2003-11-20 2008-03-25 International Business Machines Corporation Apparatus and method for inter-program authentication using dynamically-generated public/private key pairs
US20070186099A1 (en) 2004-03-04 2007-08-09 Sweet Spot Solutions, Inc. Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method
WO2006012058A1 (fr) 2004-06-28 2006-02-02 Japan Communications, Inc. Systemes et procedes d'authentification mutuelle de reseau
KR20060131536A (ko) 2005-06-16 2006-12-20 삼성전자주식회사 BE 시스템에서의 홈 디바이스의 통합적 키(key) 관리방법 및 그 시스템
JP5424008B2 (ja) 2006-12-19 2014-02-26 日本電気株式会社 共有情報の管理方法およびシステム
US20080235513A1 (en) 2007-03-19 2008-09-25 Microsoft Corporation Three Party Authentication
WO2009060283A1 (fr) 2007-11-05 2009-05-14 Synaptic Laboratories Limited Procédé et appareil pour une communication sécurisée
US20100318802A1 (en) 2007-11-20 2010-12-16 Ajit Balakrishnan Systems and methods for establishing a secure communication channel using a browser component
AU2009204512B2 (en) 2008-01-07 2014-06-12 Security First Corp. Systems and methods for securing data using multi-factor or keyed dispersal
US8302167B2 (en) 2008-03-11 2012-10-30 Vasco Data Security, Inc. Strong authentication token generating one-time passwords and signatures upon server credential verification
FR2928798B1 (fr) 2008-03-14 2011-09-09 Centre Nat Rech Scient Procede d'authentification, systeme d'authentification, terminal serveur, terminal client et programmes d'ordinateur correspondants
US8422687B2 (en) 2008-05-30 2013-04-16 Lantiq Deutschland Gmbh Key management for communication networks
US9344438B2 (en) 2008-12-22 2016-05-17 Qualcomm Incorporated Secure node identifier assignment in a distributed hash table for peer-to-peer networks
US8751829B2 (en) 2009-02-05 2014-06-10 Wwpass Corporation Dispersed secure data storage and retrieval
US8752153B2 (en) 2009-02-05 2014-06-10 Wwpass Corporation Accessing data based on authenticated user, provider and system
US8588410B2 (en) 2009-04-06 2013-11-19 Elster Electricity, Llc Simplified secure symmetrical key management
US20100312810A1 (en) 2009-06-09 2010-12-09 Christopher Horton Secure identification of music files
US9219612B2 (en) 2009-06-26 2015-12-22 France Telecom Method of mutually authenticating a reader and a radio tag
SE534384C2 (sv) 2009-07-03 2011-08-02 Kelisec Ab Förfarande för att alstra en krypterings-/dekrypteringsnyckel
AU2011205391B2 (en) 2010-01-12 2014-11-20 Visa International Service Association Anytime validation for verification tokens
WO2011128183A2 (fr) 2010-04-13 2011-10-20 Telefonaktiebolaget L M Ericsson (Publ) Procédé et appareil pour l'interfonctionnement avec une architecture d'authentification d'ouverture de session
EP2651072A3 (fr) 2010-09-20 2013-10-23 Security First Corp. Systèmes et procédés de partage de données sécurisé
US9100188B2 (en) 2011-04-18 2015-08-04 Bank Of America Corporation Hardware-based root of trust for cloud environments
KR101800659B1 (ko) 2011-07-08 2017-11-23 삼성전자 주식회사 이동 통신 시스템에서 단말 설정 방법
US8914635B2 (en) 2011-07-25 2014-12-16 Grey Heron Technologies, Llc Method and system for establishing secure communications using composite key cryptography
FR2983374B1 (fr) 2011-11-29 2015-04-10 Oberthur Technologies Protocole d'authentification mutuelle
US8656180B2 (en) 2011-12-06 2014-02-18 Wwpass Corporation Token activation
WO2013122869A1 (fr) 2012-02-13 2013-08-22 Eugene Shablygin Partage de données sécurisées
US20130219481A1 (en) 2012-02-16 2013-08-22 Robert Matthew Voltz Cyberspace Trusted Identity (CTI) Module
EP2663051A1 (fr) 2012-05-07 2013-11-13 Industrial Technology Research Institute Sytème d'authentification pour communications de dispositif à dispositif et procédé correspondant
US20140149742A1 (en) 2012-11-28 2014-05-29 Arnold Yau Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
JP6018511B2 (ja) 2013-01-31 2016-11-02 株式会社東芝 サーバ装置、グループ鍵通知方法及びそのプログラム
AU2014216207A1 (en) 2013-02-13 2015-09-10 Security First Corp. Systems and methods for a cryptographic file system layer
US9397836B2 (en) 2014-08-11 2016-07-19 Fisher-Rosemount Systems, Inc. Securing devices to process control systems
SE538279C2 (sv) 2014-09-23 2016-04-19 Kelisec Ab Förfarande och system för att fastställa förekomst av
SE542460C2 (en) 2014-10-09 2020-05-12 Kelisec Ab Improved security through authenticaton tokens
SE540133C2 (en) 2014-10-09 2018-04-10 Kelisec Ab Improved system for establishing a secure communication channel
SE539271C2 (en) 2014-10-09 2017-06-07 Kelisec Ab Mutual authentication

Also Published As

Publication number Publication date
WO2016056987A1 (fr) 2016-04-14
US20170295016A1 (en) 2017-10-12
EP3205048B1 (fr) 2019-08-21
EP3205048A1 (fr) 2017-08-16
TW201626752A (zh) 2016-07-16
EP3205048A4 (fr) 2018-05-30
SE1451210A1 (en) 2016-04-10
US10348498B2 (en) 2019-07-09

Similar Documents

Publication Publication Date Title
US10693848B2 (en) Installation of a terminal in a secure system
EP3205048B1 (fr) Génération d'une clé de cryptage symétrique
US10356090B2 (en) Method and system for establishing a secure communication channel
US10511596B2 (en) Mutual authentication
US10733309B2 (en) Security through authentication tokens
JP2017521934A (ja) クライアントとサーバとの間の相互検証の方法
US20200195446A1 (en) System and method for ensuring forward & backward secrecy using physically unclonable functions
US20160359822A1 (en) Sovereign share encryption protocol
WO2018047132A1 (fr) Système et procédé d'authentification et de communication sécurisée
Huang et al. A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment
US20240267224A1 (en) Cyber security method and system based on multi-party and multi-factor dynamic strong encryption authentication
Singh et al. Enhancing the Security of JSON Web Token Using Signal Protocol and Ratchet System
Zakir et al. A Survey on Various Encryption/Decryption Techniques Used in Mobile and Cloud Computing
TW202433321A (zh) 基於多方多因子動態強加密認證之資通安全方法與系統
Zeb Enhancement in TLS authentication with RIPEMD-160
Lee et al. Security analysis and improvement of an anonymous authentication scheme for roaming services